Movatterモバイル変換


[0]ホーム

URL:


  1. Home
  2. Software
  3. FluBot

FluBot

FluBot is a multi-purpose mobile banking malware that was first observed in Spain in late 2020. It primarily spread through European countries using a variety of SMS phishing messages in multiple languages.[1][2] An international law enforcement operation of 11 countries eventually disrupted the spread ofFluBot.[3]

ID: S1067
Type: MALWARE
Platforms: Android
Version: 1.1
Created: 28 February 2023
Last Modified: 27 March 2025
Mobile Layer
downloadview

Techniques Used

DomainIDNameUse
MobileT1453Abuse Accessibility Features

FluBot abuses accessibility features in three ways: steal application credentials, evade detection and removal, and send SMS for lateral movement.[4]

MobileT1517Access Notifications

FluBot can access app notifications.[1]

MobileT1437.001Application Layer Protocol:Web Protocols

FluBot can use HTTP POST requests on port 80 for communicating with its C2 server.[1]

MobileT1637.001Dynamic Resolution:Domain Generation Algorithms

FluBot can use Domain Generation Algorithms to connect to the C2 server.[1]

MobileT1521.002Encrypted Channel:Asymmetric Cryptography

FluBot has encrypted C2 message bodies with RSA and encoded them in base64.[1]

MobileT1646Exfiltration Over C2 Channel

FluBot can send contact lists to its C2 server.[1]

MobileT1628.002Hide Artifacts:User Evasion

FluBot can uselocale.getLanguage() to choose the language for notifications and avoid user detection.[1]

MobileT1629.001Impair Defenses:Prevent Application Removal

FluBot can use Accessibility Services to make removal of the malicious app difficult.[2]

.003Impair Defenses:Disable or Modify Tools

FluBot can disable Google Play Protect to prevent detection.[1][3]

MobileT1417.002Input Capture:GUI Input Capture

FluBot can add display overlays onto banking apps to capture credit card information.[1]

MobileT1406Obfuscated Files or Information

FluBot can obfuscated class, string, and method names in newer malware versions.[1]

MobileT1660Phishing

FluBot has been distributed via malicious links in SMS messages.[3]

MobileT1636.003Protected User Data:Contact List

FluBot has used the contact list to infect more devices.[1][3]

.004Protected User Data:SMS Messages

FluBot can intercept SMS messages and USSD messages from Telcom operators.[1]

MobileT1604Proxy Through Victim

FluBot can use a SOCKS proxy to evade C2 IP detection.[1]

MobileT1582SMS Control

FluBot can send SMS phishing messages to other contacts on an infected device.[1][2]

MobileT1409Stored Application Data

FluBot has collected credentials, banking details and other information from the victim device.[3]

References

×

[8]ページ先頭

©2009-2026 Movatter.jp